5th Securing Online Gaming SummitFollow @infosec_events
InfoSec Conference Summary
The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.Add this conference to your favourites
In January 2018, researchers at Google Project Zero revealed an exploit affecting every currently supported release from Blizzard, the publisher of a series of popular online games with a monthly active user count of some 40 million.
The vulnerability was contained in an update agent that applied upgrades and patches to games with millions of worldwide users. It permitted commands to install, uninstall and change settings on the devices used for playing these games. Blizzard’s initial fix itself was problematic as was its communication with the researcher who discovered the DNS-binding exploit.
It’s not just software. The graphics cards in gamers’ high-end PCs are ready-made for the cryptomining malware that is now being delivered via gaming and sports apps and sites such as the Google Play Store.
And because of its financial and security profile, the online gambling industry is still a go-to test bed for hackers looking to develop new exploits.
This incident is just the latest evidence that the huge numbers of connected devices, the vast sums of money now involved in eSports and online gaming and gambling and the complexity of the sector’s use of mobile, tablet and desktop hardware are increasingly attracting the attentions of the most sophisticated and organised cyber-criminals and not just the traditional lone-wolves looking to demonstrate coding skills to their fellow gamers and hackers.
So how can eGaming, eGambling and eSports companies keep up with the evolving threats to their business models? What new technologies and techniques are being developed to ensure that they stay one-step ahead? And what do gaming/gambling CISOs need to focus on?
e-Crime Securing Online Gaming will cover these and other key subjects for its audience of professionals tasked with safeguarding digital assets and sensitive data. There will be real-life case studies, strategic talks and technical break-out sessions to help end-users understand how new technologies can be cost-effectively deployed in real-life business situations.